Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSQR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]
QR codes can help you buy tickets, speed up logins and streamline software installation. But, when you scan one, how can you be sure that it’ll take you to a legitimate website? Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless […]
SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the user’s device.
The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.
A special episode dedicated to social media culture!
IT workers have been storing files on their computers' hard drives. One councilman's alleged response: “That can’t be right? That’s real?”
A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.
Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.